The ongoing revelations of governmental electronic spying point to a problem larger than National Security Agency malfeasance, or even of security weaknesses. Rather the controversy arising from Edward Snowden's leaked documents suggest we face unresolved issues around data ownership, argued security expert Bruce Schneier.

"Fundamentally, this is a debate about data sharing, about surveillance as a business model, about the dichotomy of the societal benefits of big data versus the individual risks of personal data," Schneier told attendees of the Usenix LISA (Large Installation System Administration Conference), being held in Washington this week.

"We might not buy [it], but the basic NSA argument is 'You must give us your data because it is keeping you safe.'"

Schneier has been an outspoken critic of the NSA since Snowden, a former NSA contractor, first leaked documents showing the many ways in which the intelligence agency had tapped into the Internet and data centers to collect data en masse about people's activities.

"The NSA has turned the Internet into a giant surveillance platform," Schneier said via Skype.

But for most of his talk, Schneier urged the audience to think beyond the present controversy of the NSA, and think about ways we generate data, and the ways large companies make money from such information.

What the NSA leaks show is that "we have made surveillance too cheap. We have to make surveillance expensive again," Schneier said. "The goal should be to force the NSA , and all similar adversaries, to abandon wholesale collection in favor of targeted collection."

Such costs of making our personal data available are easy to ignore. Schneier admitted to using the Google service Waze, which collects travel data from all of its users to show alerts of traffic jams. Users of the service freely give up data about their locations in exchange for the potentially valuable knowledge of which roads to avoid.

The chief business model of the Internet has been surveillance, Schneier noted, though it's companies such as Google and Facebook that are collecting data on our activities, rather than secretive government agencies. Schneier noted that because the cost of computing and storage continues to plummet, it is easier for most people and organizations not only to create a lot of data but also to keep all of the data that is being generated.

This business model, however, makes it very relatively easy for the NSA, or any adequately government sponsored intelligence agency, to tap into such data sources.

"How do we design systems that benefit society as a whole, while protecting individuals? This is the problem we must solve," Schneier said.

The way to thwart such invasions of privacy is to raise the cost of collecting data en masse, he argued. In some ways, the Snowden documents have already started this process. Fear of NSA snooping has already soured some European companies from using U.S. cloud services, which, in turn, have started putting pressure on Congressional representatives to reign in NSA. Schneier noted that Google has become one of the top lobbyists in Washington D.C.

It is now become more expensive, in terms of public relations, for technology companies to cooperate too readily with the NSA. "It used to be there was no cost to cooperating with the NSA. Now there is," he said.

Better use of encryption is another way to keep surveillance in check, Schneier noted. "The more we enable encryption, the safer everyone is," he said. The heavily encrypted Tor network, for instance, has been immune to eavesdropping, to much to the NSA's annoyance.

Schneier did speculate as to what, if any, methods that the NSA might have to break today's encryption algorithms. The vast number of mathematicians the NSA has hired suggests that the agency could be a few years ahead of academic researchers in terms of finding flaws in these algorithms. He also noted that, despite the use of encryption, the communication endpoints of most communication systems are not very secure, giving the NSA easier access to data. Still, these advantages help more in personal targeting, rather than in information collection across an entire population.

Getting people interested in issues of privacy can be a challenge, even after the NSA revelations, Schneier admitted. At the end of the presentation, one attendee asked how Schneier would respond to someone claiming not to be bothered by government snooping because he or she did not have anything to hide.

Schneier suggested asking that person what his or her salary is. Or to ask about details of sexual fantasies.

"You could remind them that Google knows the sexual fantasies of everyone in the room. That is quite creepy," he said.

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited. Copyright 2013 IDG Communications.
ABN 14 001 592 650. All rights reserved.

Contact Us

With over 25 years of brand awareness and credibility, Good Gear Guide (formerly PC World Australia), consistently delivers editorial excellence through award-winning content and trusted product reviews.